Hi Naveen, All your videos are very informative. Can you please attach the material/slide in google cloud so that we do not require to watch the video again. It will be very useful when we quickly prepare for the interview
Like your channel very much! Thx! Naveen, can you record a video example about using https session with java servlets? What I need to write to use ssl or tsl key in my connection with clients?
Hi Naveen, Thank you very much for the detailed explanation. One doubt after the final step every time they use session key as token? If yes it got any expiry and how the expiry will define
CA is a browser feature which will validate the authenticity of the certificate provided by server. It will check certification is valid and not expired.
Hey Naveen While explaining about Asymmetric u have mentioned about 1024/2048 bits, Not able to relate what is 1024 and 2041 in Request and Response ? Thanks for video very helpful
Hi Naveen I am working as QE automation tester can you please tell me for java certification which one I should pick. I need atleast basic java certification
Server will encrypt response with private key and then client will decrypt this encrypted response with public key. Correct me if I am wrong? My doubt is as public key is known to Hacker also as it is public then Hacker also can decrypt response.
could u help me with one of the issue I am facing in my proj, I have to verify 3 thing on page and the page has the timer which is going fast because of this my script is failing. Any solution for this
One doubt, Is it not possible to hack response data sending from server for any other user's request using public key.? since the hacker is aslo having the public key?
Thank you Naveen for all your videos. Everyday, when I get up in the morning the first thing I do is "Open RUclips on my phone and check for any new videos from Naveen." I have tried to contact you via Facebook Messenger but I was unable to reach you. Please give me a few minutes time to talk to you.
Wow!!! Its like u have completely gone through the mind of interviewer.
I have faced this same question in one of my interview given few days back.
Thanks for wonderful explanation..although we have been taught these during BTech days but can understand it now better from practical point of view.
Tum bahut achha kaam karta hai Naveen
Thanks Naveen fro an excellent Presentation.
Thankyou for your wonderful explanation ....really i learned about SSL by seeing your video
Very nice & precise information.
Very clear explanation. Thank you
I understood each and every bit u taught in this video because of your Brilliant explanation. Iam happy to land at your channel.
Excellent Video
Thanks lot naveen. Your effort are most valuable
Awesome explanation
Interesting topic.. Simple too..!! Thanks for sharing.
Super explanation 👌🏻
Please make videos for api testing with cypress
👍, the best detailed explanation 👌I have ever came across on http and https
Take care Naveen and stay safe
Nice explanation. Loved it....
Hi Naveen, All your videos are very informative. Can you please attach the material/slide in google cloud so that we do not require to watch the video again. It will be very useful when we quickly prepare for the interview
Superb explanation!
Excellant
Awesome explanation.
Please made video on SAML SSO also...🙏
Naveen you are just awesome
tq so much naveen sir for this vedio.
Very good video😊
Thank for the video
Well explained
Superb
Like your channel very much! Thx! Naveen, can you record a video example about using https session with java servlets? What I need to write to use ssl or tsl key in my connection with clients?
Hi Naveen, Can you please prepare a video on OpenSSL and Java Keystore on how the private key, public key are generated and CA certificate is stored
Hi Naveen, Thank you very much for the detailed explanation.
One doubt after the final step every time they use session key as token? If yes it got any expiry and how the expiry will define
Naveen plz make video on yaml... how to configure and usuage espl from tester point of view
Thanks for such excellent video... I am still not clear about certificates..how CA validate certificates and what are parameters to verify
CA is a browser feature which will validate the authenticity of the certificate provided by server. It will check certification is valid and not expired.
👍
@14:11 it's the encrypted data sent by WS not the decrypted...
Anyways I it's 👍👌👍👌
Perfect Emoji of a Bad Guy
Thank You so much
Hi Naveen, can you please have a video about "Man in the Middle" Attack too ?
Hey Naveen While explaining about Asymmetric u have mentioned about 1024/2048 bits, Not able to relate what is 1024 and 2041 in Request and Response ? Thanks for video very helpful
Hi Akula, Its the length of Private key while generating them through some method(For eg: RSA Algorithm)
what is mean by HTTP header injection?
How is the transfer of public key and certificate made secured. i.e. if someone gets hold of these things he can use it to decrypt data in the middle
Hi Naveen I am working as QE automation tester can you please tell me for java certification which one I should pick. I need atleast basic java certification
You can try ocjp certification
Server will encrypt response with private key and then client will decrypt this encrypted response with public key.
Correct me if I am wrong?
My doubt is as public key is known to Hacker also as it is public then Hacker also can decrypt response.
Public key is not common to all clients. Every client will have its own public key which is unique provided by server.
@@naveenautomationlabs Thanks for update.
But Hacker can't find this public key?
Hi Naveen do you have a paid course for mobile automation?
could u help me with one of the issue I am facing in my proj, I have to verify 3 thing on page and the page has the timer which is going fast because of this my script is failing. Any solution for this
One doubt, Is it not possible to hack response data sending from server for any other user's request using public key.? since the hacker is aslo having the public key?
For every client/browser session, public key will be different. Hacker is having his own public key, he can not use the same key to sniff others data.
Thank you Naveen for all your videos. Everyday, when I get up in the morning the first thing I do is "Open RUclips on my phone and check for any new videos from Naveen."
I have tried to contact you via Facebook Messenger but I was unable to reach you. Please give me a few minutes time to talk to you.
You can subscribe to the channel and press the bell button so that you get a notification whenever a new video is uploaded by @naveen.